Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 2min
How to Stop a Microsopt
02:13 • 2min
Macroso's Move to Disable Macros in Files Downloaded From the Internet
04:07 • 2min
The Internal Revenue Service Is Turning Away From I D Dot Me
06:18 • 4min
The State Education Department's Hd Male Code Was Visible in a Publicly Accessible Web Site Operated by the State's Education Department
10:29 • 2min
Apple's Air Tags
12:28 • 2min
Air Tag, Tile and a GPS Tracker - The New York Times Report
14:04 • 2min
T Two Security Vulnerable Cracks Macs
16:19 • 2min
Password Strength - How to Avoid Multiple Guesses
18:23 • 3min
The C Ia Collecting Data in Bulk in a Secret Programme
21:12 • 1min
The C Ia Collection Is a Secret Program That Shouldn't Be Secret
22:38 • 2min
Honor Lock Proctoring Tool
25:06 • 5min
Using Ultrasonic Sound Beacons to Track Your Behavior
29:37 • 2min
Is Ultrasonic Beacon Tracking on Android Apps?
31:54 • 4min
Google's Ap Tracking Sandbox Announcement Reveals the Limits of Privacy Enhancement
36:06 • 2min
G Mal and G Co, or Gogles Email and Calendrating Services
38:25 • 3min
Is Fast Mail Secure?
40:58 • 1min
Fast Mail
42:22 • 3min
How to Migrate From Google to Proton Mail
45:33 • 2min
Proton Mail
48:00 • 2min
Selphone Security Interview - Art Everyone
50:09 • 3min